

proton works, idc what one of the 5 owners say, it is impossible to avoid that type of people
proton works, idc what one of the 5 owners say, it is impossible to avoid that type of people
NO. use searxng (https://searx.be/ and https://priv.au/ )
either pi-hole or or a filtering dnscrypt server
like blahdns-de, odoh-koki-noads-ams
vscodium. Easy to use for beginners (i’m a beginner too), fully open-source, all microsoft tracking binaries removed. Aviable for Windows, Linux, macOS, darwin, propably bsd, or even as a webview, and supports a lot of architectures. Great for intrepeted languages, but supports compiled ones too
that’s not how it works. Your phone can easily overheat if you use it too much, even if your device can handle it. Smartphones don’t have cooling like pcs and laptops (except some rog phone and stuff). If you don’t want to fry your processor, only run LLMs on high-end gaming pcs with All in one water cooling
you only fry your phone with this. very bad idea
the chance of this is almost zero. if you are a dangerous cybercriminal, they will track your device down by a networking solution, wait until you leave it unattended and install a hardware-based spy device and capture evidence. No fbi agent will fuck around with keyboard sounds or movie bs like that
lol no. only the sounds of the keys can identify the keyboard’s model
Do you have a clue about what haveibeenpwned is?
is [email protected] legit? i got an email like that